This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote Mandriva Linux host is missing one or more security
A vulnerability has been found and corrected in ISC DHCP :
Integer overflow in the ISC dhcpd 3.0.x before 3.0.7 and 3.1.x before
3.1.1; and the DHCP server in EMC VMware Workstation before 5.5.5
Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5
Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3
Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before
1.0.4 Build 56528; allows remote attackers to cause a denial of
service (daemon crash) or execute arbitrary code via a malformed DHCP
packet with a large dhcp-max-message-size that triggers a stack-based
buffer overflow, related to servers configured to send many DHCP
options to clients (CVE-2007-0062).
Stack-based buffer overflow in the script_write_params method in
client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before
4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers
to execute arbitrary code via a crafted subnet-mask option
ISC DHCP Server is vulnerable to a denial of service, caused by the
improper handling of DHCP requests. If the host definitions are mixed
using dhcp-client-identifier and hardware ethernet, a remote attacker
could send specially crafted DHCP requests to cause the server to stop
Packages for 2008.0 are provided for Corporate Desktop 2008.0
This update provides fixes for this vulnerability.
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true
Family: Mandriva Local Security Checks
Nessus Plugin ID: 42998 (mandriva_MDVSA-2009-312.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now